Content Policy

1 —What this policy is for

We provide a website builder and a tag-management service that lets physical NFC tags, QR codes, and direct links (and their UUIDs) point to sites and pages you create with us, or to external websites. This policy explains what you may publish and what we won’t allow, and what we’ll do if something breaks the rules.

2 — Quick summary

Do not use our service to harm others, break the law, trick people, or secretly track people. Don’t publish malware, phishing pages, illegal goods, violent extremism, or sexually exploitative content. Don’t use tags to stalk or secretly track people or to redirect people to dodgy downloads. If we find a problem we’ll remove the site or disable the tag mapping, tell you why, and — for serious/repeat violations — suspend or close your account.

3 — Allowed content

Most legitimate personal, business, creative, event, and product pages are fine. Examples: portfolios, small business pages, menus, event pages, contact cards, and landing pages that reasonably comply with laws and these rules.

4 — Clear examples of prohibited content

We will remove or block content that falls into any of the following categories:

A. Illegal activity

  • Content that facilitates or promotes criminal activity (drug trafficking, buying or selling illegal goods, instructions for committing crimes).

  • Content that helps avoid law enforcement.

B. Fraud, phishing, and scams

  • Pages designed to trick people into providing passwords, payment details, or personal data (phishing).

  • Landing pages that impersonate banks, government sites, or other services to steal credentials.
    (We actively monitor for and take down phishing and “quishing” / QR-NFC-based fraud.)

C. Malware, forced downloads, or hidden installers

  • Pages that attempt to install software, silently download malware, or exploit devices when a user taps a tag. NFC taps should not result in automatic installations or actions that put users at risk.

D. Tracking, stalking, and invasion of privacy

  • Using tags to secretly track or locate people, including placing tags on someone’s property or belongings to follow them, or building services intended to surveil without consent. NFC and tracking devices can be abused for stalking — we do not allow content or services that enable that.

E. Impersonation and brand abuse

  • Sites that impersonate a real person, company, or public figure with intent to mislead, scam, or abuse their identity.

F. Hate, violent or sexual exploitation

  • Hate speech that incites violence; pornographic or sexual content that is exploitative or illegal; content encouraging self-harm or violent wrongdoing.

G. Copyright & IP violations

  • Hosting or distributing copyrighted material without the right to do so. We respond to legitimate takedown notices and require you to respect others’ IP.

H. Dangerous instructions

  • Tutorials that meaningfully facilitate violent wrongdoing, weapons construction, or serious bodily harm.

I. Abuse of system features

  • Mass-creating tags to spam, re-selling tag-to-site redirects to hide malicious actors, or using dynamic redirects to evade moderation.

5 — NFC / tag-specific rules

Because we manage physical tag mappings and redirects, you agree to the following:

  1. Tag ownership & placement

    • You must have permission to place tags where they go. Don’t put tags on private property, vehicles, or personal belongings without consent.

  2. Mapping responsibility

    • Every tag UUID you program must point to content that follows this policy. We can and will disable a tag’s mapping if it violates the policy.

  3. No hidden or auto-executing actions

    • A tag may not automatically trigger downloads, execute device actions (beyond opening a web link with normal user prompts), or auto-install apps. If your workflow needs device actions, you must clearly warn users and obtain their consent.

  4. No tracking/stalking functionality

    • You may not use tags or the service to collect someone’s location or movements without their explicit, informed consent.

  5. No tag cloning to impersonate

    • Intentionally duplicating, reprogramming, or replacing tags to make them look like an official tag from another person or brand is prohibited.

  6. Dynamic redirect transparency

    • If your tag uses dynamic redirects or shortlinks, you must not use those features to cloak malicious destinations. You must keep an accurate record in your account of final destinations for audit.

  7. Third-party integrations

    • If you integrate payment, login, or other third-party services via a tag, those integrations must follow their providers’ rules and relevant law.

6 — How we enforce

We try to be fair and fast. Steps we may take, depending on severity:

  1. Automated detection / flagging. We may automatically scan links and destinations for known phishing, malware, or blocklisted domains.

  2. Quick action for dangerous content. For clear, high-risk violations (malware, active phishing, stalking), we’ll immediately disable the tag(s) and take the site offline. We’ll notify the account owner with the reason when possible.

  3. Warning & temporary suspension. For lower-severity or first-time issues we may require changes, give a warning, or temporarily suspend the site until it’s fixed.

  4. Account termination for repeat or egregious abuse. Repeat offenders or severe violations (large-scale fraud, child sexual exploitation, etc.) will have their accounts terminated and their content removed.

  5. Preserve logs & cooperate with authorities. We keep logs and may share relevant data with law enforcement for criminal investigations or as required by law.

  6. Appeals. If we take action, you can appeal by contacting support. We’ll review appeals and respond with our decision and rationale.

7 — What we look for when deciding

We consider context: intent, harm, whether the content was promptly removed after notice, and scale (number of tags/sites affected). Honest mistakes that are quickly corrected generally get milder treatment; deliberate fraud or harm gets immediate and strict action.

8 — How to report abuse

If someone reports your site or a tag, we’ll review it. If you see abuse on our platform, please contact us with:

  • The tag UUID or shortlink

  • Site URL (if applicable)

  • A screenshot or short description of the issue

  • Your contact info for follow-up

We’ll acknowledge reports and update you on action taken where possible.

9 — Data retention & logs

We keep basic logs so we can investigate abuse. We keep this data for the time needed to investigate and for legal obligations.

10 — Changes to this policy

We may update this policy from time to time. Major changes will be posted on our site; it’s your responsibility to check for updates.

Last Updated: 

September 29, 2025

Cookie Settings
This website uses cookies

Cookie Settings

We use cookies to improve user experience. Choose what cookie categories you allow us to use. You can read more about our Cookie Policy by clicking on Cookie Policy below.

These cookies enable strictly necessary cookies for security, language support and verification of identity. These cookies can’t be disabled.

These cookies collect data to remember choices users make to improve and give a better user experience. Disabling can cause some parts of the site to not work properly.

These cookies help us to understand how visitors interact with our website, help us measure and analyze traffic to improve our service.

These cookies help us to better deliver marketing content and customized ads.